CVE-2021-27692
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
La inyección de comandos en enrutadores Tenda G1 y G3 con versiones de firmware v15.11.0.17(9502) _CN o v15.11.0.16(9024) _CN, permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo a través de una petición "action/umountUSBPartition" diseñada. Esto ocurre porque la función "formSetUSBPartitionUmount" ejecuta la función "doSystemCmd" con una entrada no confiable
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-25 CVE Reserved
- 2021-04-15 CVE Published
- 2023-12-30 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tendacn Search vendor "Tendacn" | G1 Firmware Search vendor "Tendacn" for product "G1 Firmware" | 15.11.0.16\(9024\)_cn Search vendor "Tendacn" for product "G1 Firmware" and version "15.11.0.16\(9024\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G1 Search vendor "Tendacn" for product "G1" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G1 Firmware Search vendor "Tendacn" for product "G1 Firmware" | 15.11.0.17\(9502\)_cn Search vendor "Tendacn" for product "G1 Firmware" and version "15.11.0.17\(9502\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G1 Search vendor "Tendacn" for product "G1" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G3 Firmware Search vendor "Tendacn" for product "G3 Firmware" | 15.11.0.16\(9024\)_cn Search vendor "Tendacn" for product "G3 Firmware" and version "15.11.0.16\(9024\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G3 Search vendor "Tendacn" for product "G3" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G3 Firmware Search vendor "Tendacn" for product "G3 Firmware" | 15.11.0.17\(9502\)_cn Search vendor "Tendacn" for product "G3 Firmware" and version "15.11.0.17\(9502\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G3 Search vendor "Tendacn" for product "G3" | - | - |
Safe
|